User Information Security Awareness Quiz!

20 Questions | Total Attempts: 11670

SettingsSettingsSettings
Please wait...
User Information Security Awareness Quiz!

How well do you know about user information security awareness? To check your knowledge on the same, you can take this user information security awareness quiz. In the end, your results will be revealed. Good luck with a perfect score!


Questions and Answers
  • 1. 
    Why is it necessary for everyone to have a good understanding of Information Security policies and procedures? 
    • A. 

      It helps protect users from being victims of security incidents.

    • B. 

      It provides an understanding of pattern to follow in a security incident.

    • C. 

      It helps to understand levels of responsibility.

    • D. 

      All of the above.

  • 2. 
    What is a good way to create a password?
    • A. 

      Your child or pet name.

    • B. 

      Using numbers or symbols.

    • C. 

      A combination of upper and lowercase letters along with numbers and symbols.

    • D. 

      Using some common words from the dictionary.

  • 3. 
    Which of the following would be the best password?
    • A. 

      MySecret

    • B. 

      Dp0si#Z$2

    • C. 

      Abc123

    • D. 

      Keyboard

  • 4. 
    Which of the following is a common delivery method for viruses?
    • A. 

      Email

    • B. 

      Instant Message

    • C. 

      Internet download

    • D. 

      Portable media

  • 5. 
    While receiving an email from an unknown contact which has an attachment, you:
    • A. 

      Must open the attachment to view its contents.

    • B. 

      Just delete the email.

    • C. 

      Initially, forward the email to your co-workers to allow them to open the attachment first.

    • D. 

      Forward the email to your personal email account so you can open it at home.

  • 6. 
    What can be done to avoid email viruses?
    • A. 

      Try deleting an unexpected or unsolicited message.

    • B. 

      Try using antivirus software to scan attachments before opening.

    • C. 

      Try deleting similar messages that appear more than once in your Inbox.

    • D. 

      All the above.

  • 7. 
    Which is a proper use of email?
    • A. 

      Do not email personal information.

    • B. 

      Do send out price lists for your home-based business products.

    • C. 

      Forward inspirational and humorous emails to your co-workers to brighten their dayfor entertainment.

    • D. 

      Share an email with all your friends and co-workers to advertise a job opening in your area.

  • 8. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 9. 
    Which of the following life experiences might turn a trusted user into a malicious insider except:
    • A. 

      Frustration with co-workers.

    • B. 

      Stress.

    • C. 

      Promotion.

    • D. 

      Financial problems.

  • 10. 
    A malicious user can rely on email or webpage to launch a ____?
    • A. 

      Phishing attacks.

    • B. 

      Virus attacks.

    • C. 

      Spyware.

    • D. 

      All of the above.

  • 11. 
    Which statement most accurately describes the virus?
    • A. 

      A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources.

    • B. 

      A program that protects your computer from hackers.

    • C. 

      A program that is installed onto your computer that monitors your internet use.

    • D. 

      All of the above.

  • 12. 
    Which of the following is a measure for preventing a social engineering attack except:
    • A. 

      Do not give out a computer or network information.

    • B. 

      Do not complete confidential company tasks in an insecure setting.

    • C. 

      Do not secure sensitive documents and media.

    • D. 

      Do not give out personally identifiable information.

  • 13. 
    Which statement is true for the limited personal use policy?
    • A. 

      Conducting business for personal gain.

    • B. 

      Using company resources for political purposes.

    • C. 

      Sending an occasional personal email.

    • D. 

      Downloading music and video files.

  • 14. 
    If you're not careful during Internet browsing, what can happen?
    • A. 

      Spyware or Adware installation.

    • B. 

      Browser Hijacking.

    • C. 

      Information or identity theft.

    • D. 

      All of the above.

  • 15. 
    The initial step in Security Awareness is being able to ________ a security threat.
    • A. 

      Avoid

    • B. 

      Recognize

    • C. 

      Challenge

    • D. 

      Log

  • 16. 
    What should be done if you think the email you received is a phishing attempt?
    • A. 

      Do not reply to the message.

    • B. 

      Click the link so you can see what the site looks like.

    • C. 

      Keep your system up to date, and install up-to-date antivirus and antispyware software.

    • D. 

      Report the phishing email to the legitimate company or organization that has been spoofed.

  • 17. 
    What must be done if your password has been compromised?
    • A. 

      Change your password.

    • B. 

      Report the incident to the proper authorities - such as a system administrator(s).

    • C. 

      Check other systems that you have accounts on as they may be compromised as well.

    • D. 

      All the above.

  • 18. 
    All of these are good physical security practices except?
    • A. 

      When leaving work always wear your security badge , even if it is for a break. It should also be worn outside of the office in public for other people to know where you work.

    • B. 

      Control access to your office by ensuring the door is closed completely behind when entering and exiting from the area. Ensure that no one slips in behind you.

    • C. 

      During a task in a public setting, avoid shoulder surfing by shielding your paperwork and keyboard from view using your body.

    • D. 

      You must follow the Clear Desk and Screen Policy. Also,store confidential and sensitive items in a secure place.

  • 19. 
    What is the biggest vulnerability to computer information security?
    • A. 

      Instant Messaging, Peer-to-Peer (P2P) applications.

    • B. 

      Malware - virus, worms, spyware.

    • C. 

      Spam, Phishing attacks.

    • D. 

      End Users.

  • 20. 
    What should everyone know about information security?  
    • A. 

      Computer security is part of everyone's job.

    • B. 

      Verify everything!  You need to verify that the website is real. Also, verify that the visitor belongs where you find them.

    • C. 

      Report anything suspicious to your system administrator.

    • D. 

      Do not ignore unusual computer functioning. It might be a sign of malware.

Back to Top Back to top